Professional Documents
Culture Documents
SUPPLEMENT TO p.87of
ENGLISH GRAMMAR &
STRUCTURE REVIEW
A) Comp. Terms used as verbs in Greek: B) Greek terms used in English Computing:
sort ___________________________ _____________________________________
boot __________________________ _____________________________________
mark __________________________ _____________________________________
bin ____________________________ _____________________________________
click ___________________________ _____________________________________
serf ____________________________ _____________________________________
post ___________________________ _____________________________________
scan_ __________________________ _____________________________________
*park __________________________
*stress._________________________
*intrigue _______________________
________________________________
________________________________
_________________________________
D) Others:1. English terms borrowed into Greek as is but adopted Greek pronunciation. 2. Gr. Noun suffix
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
______________________________________.
E)?
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
________________________________________________________________________________________
_______________________________________________________________________________
"SEMESTER I SUPPLEMENT-DICTATION 1."COMPUTERS"
Listen to my reading. As I read write synonym from reading next to terms below.
1.MACHINE________________________________
2. MATHEMATICAL_______________________________
3. CARRY OUT__________________________________
4 DIFFICULTY___________________________________
5. GET BACK_________________________________
6. INTERFERENCE___________________________________
7. PARTICULAR__________________________________________
8. SIMULTANEOUSLY__________________________________
9. CATERING TO______________________________________
11. DIFFERENTIATION_______________________________________
12. CONNECTING___________________________________________
13. LAN__________________________________________________________
14.ALLOWED ___________________________________
15. JOBS_________________________________
16.LIMITED TO__________________________________
17. PROGRESS_______________________________________
19. MADE________________________
o
f
v
o
t
e
The term CAPTCHA (for Completely Automated Public *Turing Test To Tell r
Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, s
Nicholas Hopper and John Langford of Carnegie Mellon University. At the time, they
developed the first CAPTCHA to be used by Yahoo. w
e
*Alan Turing was a British pioneer in Computer Science r
(1912-1954)-hence the term in the Acronym-CAPTCHA e
r
Applications of CAPTCHAs e
c
CAPTCHAs have several applications for practical security, including (but not limited o
to): r
d
Preventing Comment Spam in Blogs. Most bloggers are familiar with e
programs that submit bogus comments, usually for the purpose of raising search d
engine ranks of some website (e.g., "buy penny stocks here"). This is called
comment spam. By using a CAPTCHA, only humans can enter comments on a i
blog. There is no need to make users sign up before they enter a comment, and n
no legitimate comments are ever lost!
Protecting Website Registration. Several companies (Yahoo!, Microsoft, etc.) o
offer free email services. Up until a few years ago, most of these services r
suffered from a specific type of attack: "bots" that would sign up for thousands d
of email accounts every minute. The solution to this problem was to use e
CAPTCHAs to ensure that only humans obtain free accounts. In general, free r
services should be protected with a CAPTCHA in order to prevent abuse by
automated programs. t
Online Polls. In November 1999, http://www.slashdot.org released an online o
poll asking which was the best graduate school in computer science (a
dangerous question to ask over the web!). As is the case with most online polls, p
revent single users from voting more than once. However, students at Carnegie
Mellon University (CMU) found a way to stuff the ballots using programs that
voted for CMU thousands of times. CMU's score started growing rapidly. The
next day, students at MIT wrote their own program and the poll became a
contest between voting "bots." MIT finished with 21,156 votes, Carnegie
Mellon with 21,032 and every other school with less than 1,000. Can the result
of any online poll be trusted? Not unless the poll ensures that only humans can
vote.
Preventing Dictionary Attacks. CAPTCHAs can also be used to prevent
dictionary attacks in password systems. The idea is simple: prevent a computer
from being able to iterate through the entire space of passwords by requiring it S
to solve a CAPTCHA after a certain number of unsuccessful logins. c
Search Engine Bots. It is sometimes desirable to keep webpages unindexed to r
prevent others from finding them easily. There is an html tag to prevent search i
engine bots from reading web pages. The tag, however, doesn't guarantee that p
bots won't read a web page; it only serves to say "no bots, please." Search t
engine bots, since they usually belong to large companies, respect web pages
that don't want to allow them in. However, in order to truly guarantee that bots S
won't enter a web site, CAPTCHAs are needed. e
Worms and Spam. CAPTCHAs also offer a plausible solution against e-mail c
worms and spam: "I will only accept an e-mail if I know there is a human u
behind the other computer." A few companies are already marketing this idea. r
i
t
Guidelines y
.
If your website needs protection from abuse, it is recommended that you use a
CAPTCHA. There are many CAPTCHA implementations, some better than others. The B
following guidelines are strongly recommended for any CAPTCHA: u
i
Accessibility. CAPTCHAs must be accessible. CAPTCHAs based solely on l
reading text — or other visual-perception tasks — prevent visually impaired d
users from accessing the protected resource. Such CAPTCHAs may make a site i
incompatible with Section 508 in the United States. Any implementation of a n
CAPTCHA should allow blind users to get around the barrier, for example, by g
permitting users to opt for an audio CAPTCHA.
Image Security. Images of text should be distorted randomly before being a
presented to the user. Many implementations of CAPTCHAs use undistorted
text, or text with only minor distortions. These implementations are vulnerable s
to simple automated attacks. For example, the CAPTCHAs shown below can all e
be broken using image processing techniques, mainly because they use a c
consistent font. u
r
e
C
A
P
T
C
HA is not easy. In addition to making the images unreadable by computers, the But
system should ensure that there are no easy ways around it at the script level. if a
Common examples of insecurities in this respect include: (1) Systems that pass comp
the answer to the CAPTCHA in plain text as part of the web form. (2) Systems uter
where a solution to the same CAPTCHA can be used multiple times (this makes can't
the CAPTCHA vulnerable to so-called "replay attacks"). read
Security Even After Wide-Spread Adoption. There are various such
"CAPTCHAs" that would be insecure if a significant number of sites start using a
them. An example of such a puzzle is asking text-based questions, such as a CAP
mathematical question ("what is 1+1"). Since a parser could easily be written TCH
that would allow bots to bypass this test, such "CAPTCHAs" rely on the fact A,
that few sites use them, and thus that a bot author has no incentive to program how
their bot to solve that challenge. True CAPTCHAs should be secure even after a does
significant number of websites adopt them. the
syste
m
Digitizing Books One Word at a Time know
the
reCAPTCHA is a free CAPTCHA service that helps to digitize books, newspapers and corre
old time radio shows. ct
answ
About 200 million CAPTCHAs are solved by humans around the world every day. In er to
each case, roughly ten seconds of human time are being spent. Individually, that's not a the
lot of time, but in aggregate these little puzzles consume more than 150,000 hours of puzzl
work each day. What if we could make positive use of this human effort? reCAPTCHA e?
does exactly that by channeling the effort spent solving CAPTCHAs online into Here'
"reading" books. s
how:
To archive human knowledge and to make information more accessible to the world, Each
multiple projects are currently digitizing physical books that were written before the new
computer age. The book pages are being photographically scanned, and then word
transformed into text using "Optical Character Recognition" (OCR). The transformation that
into text is useful because scanning a book produces images, which are difficult to store cann
on small devices, expensive to download, and cannot be searched. The problem is that ot be
OCR is not perfect. read
corre
ctly
by
OCR
is
given
to a
user
reCAPTCHA improves the process of digitizing books by sending words that cannot be in
read by computers to the Web in the form of CAPTCHAs for humans to decipher. conju
More specifically, each word that cannot be read correctly by OCR is placed on an nctio
image and used as a CAPTCHA. This is possible because most OCR programs alert n
you when a word cannot be read correctly. with
anoth
er
word for which the answer is already known. The user is then asked to read both words.
If they solve the one for which the answer is known, the system assumes their answer is
correct for the new one. The system then gives the new image to a number of other
people to determine, with higher confidence, whether the original answer was correct.
Currently, we are helping to digitize old editions of the New York Times and books
from Google Books.
Bots____________________________________,
iterate____________________________________, plausible
_______________________________________,
vulnerable_________________________________________,incentive_________
_________________________, channeling the effort_________________________
________________________________________,
decipher__________________________________________,